General

  • Target

    ISO_certification_027.js

  • Size

    31KB

  • Sample

    210906-pp216sbag2

  • MD5

    701e94c08ec42f456eaff2d6644d3a09

  • SHA1

    2830ec19e12f15a91f25fffb2c600a660267636c

  • SHA256

    3a5ff06192419f8461bffe6e5ee67f8d47c5338a251fa734639156968883b6a7

  • SHA512

    d73c4c2c349685023717d23982327ff9026153a89e4d318230e4eff6d415e94b4d8346ac11f1802a9599d151c07f878698317ee945662cb8a9271768c95cd9cb

Malware Config

Targets

    • Target

      ISO_certification_027.js

    • Size

      31KB

    • MD5

      701e94c08ec42f456eaff2d6644d3a09

    • SHA1

      2830ec19e12f15a91f25fffb2c600a660267636c

    • SHA256

      3a5ff06192419f8461bffe6e5ee67f8d47c5338a251fa734639156968883b6a7

    • SHA512

      d73c4c2c349685023717d23982327ff9026153a89e4d318230e4eff6d415e94b4d8346ac11f1802a9599d151c07f878698317ee945662cb8a9271768c95cd9cb

    • Vjw0rm

      Vjw0rm is a remote access trojan written in JavaScript.

    • Blocklisted process makes network request

    • Drops startup file

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Registry Run Keys / Startup Folder

1
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks